1.MD5
e00cf25ad42683b3df678c61f42c6bda
md5直接解密:
https://www.cmd5.com/
2.Url编码
%66%6c%61%67%7b%61%6e%64%20%31%3d%31%7d
- url直接解密:
http://www.jsons.cn/urlencode/
3.看我回旋踢
synt{5pq1004q-86n5-46q8-o720-oro5on0417r1}
- Rot13密码解密:
http://ctf.ssleye.com/rot13.html

4.看一眼就解密
ZmxhZ3tUSEVfRkxBR19PRl9USElTX1NUUklOR30=
- base64解密
https://base64.us/

5.摩斯
.. .-.. --- ...- . -.-- --- ..-
- 摩斯解码
http://moersima.00cha.net/

6.[BJDCTF 2nd]签到-y1ng
QkpEe1czbGMwbWVfVDBfQkpEQ1RGfQ==
- base64解码
http://moersima.00cha.net/

7.password
- 暴力猜密码(将key改为flag)
key{zs19900315}
8.变异凯撒
afZ_r9VYfScOeO_UL^RWUc
- 思路
既然是凯撒,本质还是移位密码,但是要注意区别,看到比传统的凯撒增加了字符和数字,但是问题在于加了那些符号字符。为了避免这个问题,我们可以直接算移位个数,a-f 移位5,f-l移位6,Z-a移位7
似乎又与ASCII表对应。比较简单的脚本就是把他们都移位5(递增)就行了。
#coding:utf-8
# 变异凯撒
s = "afZ_r9VYfScOeO_UL^RWUc"
res =""
j = 5
for i in s:
res += chr(ord(i) + j)
j += 1
print res
-
- flag
flag{Caesar_variation}
9.Quoted-printable
=E9=82=A3=E4=BD=A0=E4=B9=9F=E5=BE=88=E6=A3=92=E5=93=A6
- Quoted-printable解码
http://ctf.ssleye.com/quoted.html
10.Rabbit
U2FsdGVkX1/+ydnDPowGbjjJXhZxm2MP2AgI
- Rabbit解码
https://www.sojson.com/encrypt_rabbit.html